Difference between revisions of "Fake FBI Ransomware analysis"

From Botnets.fr
Jump to navigation Jump to search
m (1 revision imported)
 
m (Text replacement - " blogs.avg.com" to "")
 
Line 5: Line 5:
|Licence=
|Licence=
|Video=
|Video=
|Link=http://blogs.avg.com/news-threats/fake-fbi-ransomware-analysis/ blogs.avg.com
|Link=http://blogs.avg.com/news-threats/fake-fbi-ransomware-analysis/
|Author=Hynek Blinka,  
|Author=Hynek Blinka,  
|NomRevue=AVG Official Blogs
|NomRevue=AVG Official Blogs

Latest revision as of 22:12, 5 August 2015

(Publication) Google search: [1]

Fake FBI Ransomware analysis
Fake-fbi-ransomware-analysis.png
Botnet Reveton
Malware
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2012 /
Editor/Conference AVG
Link http://blogs.avg.com/news-threats/fake-fbi-ransomware-analysis/ (Archive copy)
Author Hynek Blinka
Type

Abstract

In our previous blog post our AVG Web Threats Research group analyzed a Blackhole exploit kit serving the fake FBI Ransomware. Today we will have a look at the ransomware itself.

  • Payload

Here is a typical ransom malware payload once it’s active on infected computer:

User’s desktop is locked with a full-screen information displayed Task manager and Registry editor is disabled System hot keys are disabled to avoid the Trojan’s termination This is a screenshot from a system infected by fake FBI Ransomware; the criminals ask for 100 pounds to unlock the infected system

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1047,
   editor = {AVG},
   author = {Hynek Blinka},
   title = {Fake FBI Ransomware analysis},
   date = {18},
   month = May,
   year = {2012},
   howpublished = {\url{http://blogs.avg.com/news-threats/fake-fbi-ransomware-analysis/}},
 }